Showing posts with label surveillance. Show all posts
Showing posts with label surveillance. Show all posts

Wednesday, June 24, 2015

N.S.A. Eavesdropped On Last 3 French Presidents, WikiLeaks Says

Tuesday, May 19, 2015

All The Ways Your Smartphone Is Spying On You 24/7

"Have you ever wondered how Google tracks where you are? How about what those terms and conditions mean when you access free Wi-Fi?

As scary as it sounds, your smartphone’s apps share a lot of the private information on your device with marketing agencies, phone operators and other private companies. But where does all that data go? And what happens to it?

AJ+ and the interactive documentary series “Do Not Track” investigate.” *

The full interactive experience from Do Not Track: http://www.donottrack-doc.com


Tuesday, May 12, 2015

Skynet is real, and it could flag you as a terrorist

Summary:If you visit airports or swap SIM cards often, you might be flagged by "Skynet."

A scene from "Terminator." (Screenshot: Warner Bros. via CNET/CBS Interactive)
It may not be quite the self-aware computer network that takes over millions of computers and machines, but "Skynet" is real.

Documents published by The Intercept, leaked by NSA whistleblower Edward Snowden, confirm that the Skynet program exists -- at least in name only. Its name comes from the intelligent computer defense system in the "Terminator" films, which later destroys most of humanity in a nuclear apocalypse.
As the Snowden leaks began, there was "fear and panic" in Congress
Just a few minutes after the first NSA leak was published, the phones of US lawmakers began to buzz, hours before most of America would find out over their morning coffee.
The National Security Agency program analyzes location and metadata from phone records to detect potentially suspicious patterns, according to the publication. In one example, it was used to identify people that act as couriers between al-Qaeda leadership. (This may have been the program that helped identify Osama bin Laden's courier, leading to his targeted killing in Pakistan by US forces in 2011.)

According to one of the documents, it uses "behavior-based analytics," such as low-use phones that only take incoming calls, SIM card or handset swapping, or frequent disconnections from the phone network (such as powering down cellphones). Also, repeated trips mapped out by location data, including visits to other countries or airports, can flag a person as being suspicious -- or a potential terrorist.

More than 55 million cell records collected from major Pakistani telecom companies were fed into the Skynet system to determine targets of interest, the document said.

But questions remain around why the program flagged a prominent Al Jazeera journalist as a "member" of al-Qaeda. It's probably not a surprise that the system alerted on Ahmad Muaffaq Zaidan, a Syrian national, based on his frequent travel between Afghanistan and Pakistan. But the fact that it identified him as a member of a terrorist group is a mystery, as well as a great concern.

Zaidan "absolutely" denied that he is a member of al-Qaeda, and criticized the US government's "attempt at using questionable techniques to target our journalists."

We reached out to the NSA to see why it used the name, but didn't hear back at the time of writing.

Wednesday, May 6, 2015

Ancestry.com Caught Sharing Customer DNA Data With Police With No Warrant

By Jay Syrmopoulos

Idaho Falls, Idaho – Would you find it frightening— perhaps even downright Orwellian — to know that a DNA swab that you sent to a company for recreational purposes would surface years later in the hands of police? What if it caused your child to end up in a police interrogation room as the primary suspect in a murder investigation?

In an extremely troubling case out of Idaho Falls, that’s exactly what happened.

Police investigating the 1996 murder of Angie Dodge targeted the wrong man as the suspect, after looking to Ancestry.com owned Sorensen Database labs for help. The labs look for familial matches between the murderers DNA and DNA submitted for genealogical testing after failing to find a match using traditional methods.

According to The Electronic Frontier Foundation:
The cops chose to use a lab linked to a private collection of genetic genealogical data called the Sorenson Database (now owned by Ancestry.com), which claims it’s “the foremost collection of genetic genealogy data in the world.” The reason the Sorenson Database can make such an audacious claim is because it has obtained its more than 100,000 DNA samples and documented multi-generational family histories from “volunteers in more than 100 countries around the world.” Some of these volunteers were encouraged by the Mormon Church—well-known for its interest in genealogy—to provide their genetic material to the database. Sorenson promised volunteers their genetic data would only be used for “genealogical services, including the determination of family migration patterns and geographic origins” and would not be shared outside Sorenson.
Its consent form states:
The only individuals who will have access to the codes and genealogy information will be the principal investigator and the others specifically authorized by the Principal Investigator, including the SMGF research staff.
Despite this promise, Sorenson shared its vast collection of data with the Idaho police.
Without a warrant or court order, investigators asked the lab to run the crime scene DNA against Sorenson’s private genealogical DNA database. Sorenson found 41 potential familial matches, one of which matched on 34 out of 35 alleles—a very close match that would generally indicate a close familial relationship. The cops then asked, not only for the “protected” name associated with that profile, but also for all “all information including full names, date of births, date and other information pertaining to the original donor to the Sorenson Molecular Genealogy project.
Ancestry.com failed to respond to questions about how frequently it receives court orders in criminal investigations or if the company attempts to resist law enforcement requests for peoples’ private genetic information, according to The New Orleans Advocate.

This is when things become even more convoluted. The DNA from the Ancestry.com database linked a man, Michael Usry, to the case that didn’t fit the police profile, as he was born in 1952.

The cops then used the genetic information and traced his line of male descendants, ultimately finding his son Michael Usry Jr., born in 1979, which much more closely fit the police profile of the killer.

Once they had targeted Ursy Jr. as the suspect, they began to scour his Facebook page looking for connections to Idaho, finding a couple of Facebook friends that lived in the area of Idaho Falls.

Police then, by Google searching, realized that Usry Jr. was a filmmaker and had done some short films containing murder scenes. Law enforcement subsequently got a warrant for Usry Jr.’s DNA based upon the completely circumstantial evidence presented by Idaho investigators.

The cops then called Usry Jr. and asked him to meet them, under the guise that they were investigating a hit-and-run accident. Thinking he “had nothing to hide,” he agreed to meet with the investigators, without an attorney present. He was subsequently taken to an interrogation room where he eventually allowed them to collect his DNA.

Despite the flimsy circumstantial evidence used to get the warrant, ultimately the test showed that although there were a number of familial alleles shared with the murderers sample, Usry Jr.’s DNA did not conclusively match the killers.

This case is particularly troubling as it seems to decimate an individual’s right to privacy in the name of “public safety,” while allowing the police to run roughshod over people’s civil rights.

“It’s not very common to see this sort of thing, and I frankly hope it doesn’t become very common because an awful lot of people won’t bother testing” their DNA, Judy G. Russell, a genealogist and attorney who writes The Legal Genealogist blog, told The New Orleans Advocate.

There is one key difference between traditional DNA testing and familial testing. The traditional method consists of taking a sample and looking for a specific match with a given database, such as the FBI’s Combined DNA Index System, while familial searching looks for common alleles, or gene variants.

According to Voices of Liberty:
Proponents argue familial searching is a harmless way for police to crack otherwise unsolvable cases. The closest partial matches can steer investigators toward a criminal’s family members, whose DNA profiles closely resemble those of a convicted or incarcerated relative.
Skeptics like Murphy, the NYU law professor, warn that the technique drastically expands DNA testing beyond the function envisioned by states that compel criminal defendants to submit DNA samples upon arrest. Many states lack formal legal rules governing the use of familial searching by law enforcement, while Maryland has explicitly outlawed the practice.
This case exposes the very real danger posed to privacy and civil liberties by familial DNA searches and by private, unregulated DNA databases.This case only serves as a glimpse into the dystopian reality we will soon find ourselves living in, according to The Electronic Frontier Foundation.
“This risk will increase further as state and local law enforcement agencies begin to use Rapid DNA analyzers—portable machines that can process DNA in less than an hour. These machines will make it much easier for police to collect and analyze DNA on their own outside a lab. Currently, because forensic DNA analysis in a lab takes so long, we generally see its use limited to high-level felonies like rape and murder. However, Rapid DNA manufacturers are now encouraging local police agencies to analyze DNA found at the scene of low-level property crimes. This means much more DNA will be collected and stored, often in under-regulated local DNA databases. And, because most of the forensic DNA found at property crime scenes is likely to be touch DNA—this only increases the risk that people will be implicated in crimes they didn’t commit.”
Is this really the kind of future we want to create for our children? Shouldn’t we be able to research and learn about our family’s genealogical ancestry without fear that police will be reviewing our genetic information without our consent?

This case makes it clear that even when a private business states in writing that your data will be held as private and safe from prying eyes, that may very well not be what transpires.

Jay Syrmopoulos is an investigative journalist, freethinker, researcher, and ardent opponent of authoritarianism. He is currently a graduate student at University of Denver pursuing a masters in Global Affairs. Jay’s work has previously been published on BenSwann.com and WeAreChange.org.

You can follow him on Twitter @sirmetropolis, on Facebook at Sir Metropolis and now on tsu.

Tuesday, May 5, 2015

Guide to recording the police

By Alessandra Ram

It’s Your Right to Film the Police. These Apps Can Help



Police in riot gear push back on media and a crowd gathering in the street after a 10 p.m. curfew went into effect Thursday, April 30, 2015, in Baltimore.

Tuesday, February 17, 2015

NSA hiding Equation spy program on hard drives



By JOSEPH MENN

Equation infection: Kaspersky Labs says the highest number of machines infected with Equation programs were in Iran, Russia and Pakistan.

The US National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber researchers and former operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyber-espionage operations.

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.
The areas of government Equation has been able to infect by nation.
Kaspersky Labs - The areas of government Equation has been able to infect by nation.

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran's uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.

A former NSA employee told Reuters that Kaspersky's analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

NSA spokeswoman Vanee Vines declined to comment.

Kaspersky published the technical details of its research on Monday, which should help infected institutions detect the spying programs, some of which trace back as far as 2001.

The disclosure could further hurt the NSA's surveillance abilities, already damaged by massive leaks by former contractor Edward Snowden. Snowden's revelations have hurt the United States' relations with some allies and slowed the sales of US technology products abroad.

The exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China, which is already drafting regulations that would require most bank technology suppliers to proffer copies of their software code for inspection.

TECHNOLOGICAL BREAKTHROUGH

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

"The hardware will be able to infect the computer over and over," lead Kaspersky researcher Costin Raiu said in an interview.

Though the leaders of the still-active espionage campaign could have taken control of thousands of PC's, giving them the ability to steal files or eavesdrop on anything they wanted, the spies were selective and only established full remote control over machines belonging to the most desirable foreign targets, according to Raiu. He said Kaspersky found only a few especially high-value computers with the hard-drive infections.

Kaspersky's reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital, Seagate, Toshiba, IBM, Micron Technology and Samsung.

Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment.

GETTING THE SOURCE CODE

Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a road map to vulnerabilities, allowing those who study it to launch attacks much more easily.

"There is zero chance that someone could rewrite the [hard drive] operating system using public information," Raiu said.

Concerns about access to source code flared after a series of high-profile cyber attacks on Google Inc and other US companies in 2009 that were blamed on China. Investigators have said they found evidence that the hackers gained access to source code from several big US tech and defense companies.

It is not clear how the NSA may have obtained the hard drives' source code. Western Digital spokesman Steve Shattuck said the company "has not provided its source code to government agencies." The other hard drive makers would not say if they had shared their source code with the NSA.

Seagate spokesman Clive Over said it has "secure measures to prevent tampering or reverse engineering of its firmware and other technologies." Micron spokesman Daniel Francisco said the company took the security of its products seriously and "we are not aware of any instances of foreign code."

According to former intelligence operatives, the NSA has multiple ways of obtaining source code from tech companies, including asking directly and posing as a software developer. If a company wants to sell products to the Pentagon or another sensitive US agency, the government can request a security audit to make sure the source code is safe.

"They don't admit it, but they do say, 'We're going to do an evaluation, we need the source code,'" said Vincent Liu, a partner at security consulting firm Bishop Fox and former NSA analyst. "It's usually the NSA doing the evaluation, and it's a pretty small leap to say they're going to keep that source code."

Kaspersky called the authors of the spying program "the Equation group," named after their embrace of complex encryption formulas.

The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kasperky said.

Fanny was like Stuxnet in that it exploited two of the same undisclosed software flaws, known as "zero days," which strongly suggested collaboration by the authors, Raiu said. He added that it was "quite possible" that the Equation group used Fanny to scout out targets for Stuxnet in Iran and spread the virus.
 - Reuters

Tuesday, January 27, 2015

EFF’s Game Plan for Ending Global Mass Surveillance

By Rainey Reitman

We have a problem when it comes to stopping mass surveillance. 

The entity that’s conducting the most extreme and far-reaching surveillance against most of the world’s communications—the National Security Agency—is bound by United States law.

That’s good news for Americans. U.S. law and the Constitution protect American citizens and legal residents from warrantless surveillance. That means we have a very strong legal case to challenge mass surveillance conducted domestically or that sweeps in Americans’ communications.

Similarly, the United States Congress is elected by American voters. That means Congressional representatives are beholden to the American people for their jobs, so public pressure from constituents can help influence future laws that might check some of the NSA’s most egregious practices.

But what about everyone else? What about the 96% of the world’s population who are citizens of other countries, living outside U.S. borders. They don't get a vote in Congress. And current American legal protections generally only protect citizens, legal residents, or those physically located within the United States. So what can EFF do to protect the billions of people outside the United States who are victims of the NSA’s spying?

For years, we’ve been working on a strategy to end mass surveillance of digital communications of innocent people worldwide. Today we’re laying out the plan, so you can understand how all the pieces fit together—that is, how U.S. advocacy and policy efforts connect to the international fight and vice versa. Decide for yourself where you can get involved to make the biggest difference.

This plan isn’t for the next two weeks or three months. It’s a multi-year battle that may need to be revised many times as we better understand the tools and authorities of entities engaged in mass surveillance and as more disclosures by whistle-blowers help shine light on surveillance abuses.

If you’d like an overview of how U.S. surveillance law works, check out our addendum.

Intro: Mass Surveillance by NSA, GCHQ and Others 

The National Security Agency is working to collect as much as possible about the digital lives of people worldwide. As the Washington Post reported, a former senior U.S. intelligence official characterized former NSA Director Gen. Keith Alexander’s approach to surveillance as “Collect it all, tag it, store it… And whatever it is you want, you go searching for it.”

The NSA can’t do this alone. It relies on a network of international partners who help collect information worldwide, especially the intelligence agencies of Australia, Canada, New Zealand, and the United Kingdom (collectively known, along with the United States, as the “Five Eyes.”) In addition, the United States has relationships (including various levels of intelligence data sharing and assistance) with Belgium, Denmark, France, Germany, Israel, Italy, Japan, the Netherlands, Norway, Singapore, Spain, South Korea, Sweden, and potentially a number of other countries worldwide.

There are also other countries—like Russia, China, and others—engaging in surveillance of digital communications without sharing that data with the NSA. Some of those governments, including the U.S. government, are spending billions of dollars to develop spying capabilities that they use aggressively against innocent people around the world. Some of them may do so with even less oversight and even fewer legal restrictions.

Although whistle-blowers and journalists have focused attention on the staggering powers and ambitions of the likes of the NSA and GCHQ, we should never assume that other governments lack the desire to join them. Agencies everywhere are hungry for our data and working to expand their reach. Read about international surveillance law reform and fighting back through user-side encryption.

We focus here on the NSA because we know the most about its activities and we have the most legal and political tools for holding it to account. Of course, we need to know much more about surveillance practices of other agencies in the U.S. and abroad and expand our work together with our partners around the world to confront surveillance as a worldwide epidemic.

Mass surveillance is facilitated by technology companies, especially large ones. These companies often have insufficient or even sloppy security practices that make mass surveillance easier, and in some cases may be actively assisting the NSA in sweeping up data on hundreds of millions of people (for example, AT&T). In other cases, tech companies may be legally compelled to provide access to their servers to the NSA (or they may choose to fight that access). Read more about how tech companies can harden their systems against surveillance.

The NSA relies on several laws as well as a presidential order to justify its continued mass surveillance. Laws passed by Congress as well as orders from the U.S. President can curtail surveillance by the NSA, and the Supreme Court of the United States also has authority to put the brakes on surveillance.

The Game Plan

Given that the American legal system doesn’t adequately protect the rights of people overseas, what can we do in the immediate future to protect Internet users who may not be Americans?

Here’s the game plan for right now. Note that these are not consecutive steps; we’re working on them concurrently.

1.  Pressure technology companies to harden their systems against NSA surveillance
To date, there are unanswered questions about the degree to which U.S. technology companies are actively assisting the NSA.

In some cases, we know that tech companies are doing a lot to help the NSA get access to data. AT&T is a clear example of this. Thanks to whistle blower evidence, we know AT&T has a secret room at its Folsom Street facility in San Francisco where a fiber optic splitter creates a copy of the Internet traffic that passes through AT&T’s networks. That splitter routes data directly to the NSA.

Some companies have taken things a step further and deliberately weakened or sabotaged their own products to "enable" NSA spying. We don't know who's done this or what they've done, but the NSA documents make clear that it's happening. It's the height of betrayal of the public, and it could conceivably be taking place with the help even of some companies that are loudly complaining about government spying.

So what do we know about major tech companies, like Google, Facebook, Yahoo, and Microsoft? Here we have mixed reports. Documents provided by Edward Snowden and published in the Guardian and the Washington Post name nine U.S. companies—Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple—as participants in the NSA’s PRISM program. The documents indicate that the NSA has access to servers at each of these companies, and implies that these companies are complicit in the surveillance of their users.

The companies, in turn, have strongly denied these allegations, and have even formed a lobby group calling on governments to "limit surveillance to specific, known users for lawful purposes, and should not undertake bulk data collection of Internet communications."

While a start, that’s a far cry from the role companies could be playing. Tech companies also have the ability to harden their systems to make mass surveillance more difficult, and to roll out features that allow users to easily encrypt their communications so that they are so completely secure that even their service providers can’t read them. Perhaps most importantly, technology companies must categorically resist attempts to insert back doors into their hardware or software.

There's also an important legal issue that can't be ignored. Tech companies are in a unique position to know about surveillance requests that are kept secret from the press and the public. These companies may have the best chance to fight back on behalf of their users in court (as Yahoo has done).

What’s more, tech companies literally spend millions of dollars to lobby for laws in Washington and enjoy incredible access to and influence over U.S. lawmakers. Often, companies spend that money trying to derail potential regulation. Instead, these companies could be heavily prioritizing positive surveillance reform bills.

So how do we get tech companies to start fighting surveillance in court, hardening their systems against surveillance, pushing back against the administration, and lobbying for real reform? We’re focused on transparency—uncovering everything we can about the degree to which big tech companies are actively helping the government—and public pressure. That means highlighting ways that companies are fighting surveillance and calling out companies that fail to stand up for user privacy.  

It’s why we’re proud to support the Reset the Net campaign, designed to get companies big and small to take steps to protect user data. It's also why we're working to make what companies do and don't do in this area more visible. Campaigns like HTTPS Everywhere and our work on email transport encryption, as well as scorecards like Who Has Your Back are designed to poke and prod these companies to do more to protect all their users, and get them to publicly commit to steps that the public can objectively check.

We also need to cultivate a sense of responsibility on the part of all those who are building products to which the public entrusts its most sensitive and private data. The people who create our computing devices, network equipment, software environments, and so on, need to be very clear about their responsibility to the users who have chosen to trust them. They need to refuse to create backdoors and they need to fix any existing backdoors they become aware of. And they need to understand that they themselves, unfortunately, are going to be targets for governments that will try to penetrate, subvert, and coerce the technology world in order to expand their spying capabilities. They have a grave responsibility to users worldwide and we must use public pressure to ensure they live up to that responsibility.

2. Create a global movement that encourages user-side encryption

Getting tech giants to safeguard our digital lives and changing laws and policies might be slow going, but anybody could start using encryption in a matter of minutes. From encrypted chat to encrypted email, from secure web browsing to secure document transfers, encryption is a powerful way to make mass surveillance significantly more difficult.

However, encryption can be tricky, especially if you don’t have a team of engineers to walk you through it the way we do at EFF. With that in mind, we’ve created Surveillance Self Defense, an in-depth resource that explains encryption to folks who may want to safeguard their data but have little or no idea how to do it.

We’ve already translated the materials into Spanish and Arabic, and we’re working on even more translations.
             
We’ll continue to expand these materials and translate them into as many languages as possible, while also doing a public campaign to make sure as many people as possible read them.

Again, the more people worldwide understand the threat and the more they understand how to protect themselves—and just as importantly, what they should expect in the way of support from companies and governments—the more we can agitate for the changes we need online to fend off the dragnet collection of data.

3. Encourage the creation of secure communication tools that are easier to use

Many of the tools that are using security best practices are, frankly, hard to use for everyday people. The ones that are easiest to use often don’t adopt the security practices that make them resilient to surveillance.

We want to see this problem fixed so that people don’t have to trade usability for security. We’re rolling out a multi-stage Campaign for Secure and Usable Crypto, and we kicked it off with a Secure Messaging Scorecard. The Secure Messaging Scorecard is only looking at a few criteria for security, and the next phases of the project will home in on more challenging security and usability objectives.

The goal? Encouraging the development of new technologies that will be secure and easy for everyday people to use, while also pushing bigger companies to adopt security best practices.

4. Reform Executive Order 12333

Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333.

This executive order was created by a stroke of the pen from President Ronald Reagan in 1981.

President Obama could undo the worst parts of this executive order just as easily, by issuing a presidential order banning mass surveillance of people regardless of their nationality.

We’ve already launched the first phase of our campaign to reform Executive Order 12333.

5. Develop guiding legal principles around surveillance and privacy with the help of scholars and legal experts worldwide

The campaign got started well before the Snowden leaks began. It began with a rigorous policy document called the International Principles on the Application of Human Rights to Communications Surveillance, which features 13 guiding principles about limiting surveillance. Written by academics and legal experts from across the globe, the principles have now been endorsed by over 417 NGO's and 350,000 individuals worldwide, and have been the basis for a pro-privacy resolution successfully passed by the United Nations.

The 13 Principles, as they're also known, are also meant to work both locally and globally. By giving politicians and activists the context for why mass surveillance is a violation of established international human rights law, they make it clear that legalizing mass surveillance—a path promoted by the Five Eyes countries—is the wrong way forward. The 13 Principles are our way of making sure that the global norm for human rights in the context of communication surveillance isn't the warped viewpoint of NSA and its four closest allies, but that of 50 years of human rights standards showing mass surveillance to be unnecessary and disproportionate.

6. Cultivate partners worldwide who can champion surveillance reform on the local level, and offer them support and promotion

Katitza Rodriguez, EFF’s International Rights Director, is rarely in our San Francisco office. That’s because the majority of her time is spent traveling from country to country, meeting with advocacy groups on the ground throughout Latin America and parts of Europe to fight for surveillance law reform. Katitza and the rest of EFF’s international team assist these groups in working to build country-specific plans to end mass surveillance at home and abroad.

The goal is to engage activists and lawyers worldwide who can use the 13 Principles and the legal analyses we’ve prepared to support them at the national level to fight against the on-going trend of increased surveillance powers. For example, we teamed up with activists in Australia, Mexico, and Paraguay to help fight data retention mandates in those countries, including speaking in the Paraguayan National Congress.

EFF is especially focused on countries that are known to share intelligence data with the United States and on trying to understand the politics of surveillance behind those data sharing agreements and surveillance law proposals.

We’ve been sharing with and learning from groups across the world a range of different tactics, strategies, and legal methods that can be helpful in uncovering and combating unchecked surveillance. Our partners are starting to develop their own national surveillance law strategies, working out a localized version of the Who Has Your Back campaign, evaluating strategic litigation, and educating the general public of the danger of mass surveillance.

In certain locales, these battles are politically and socially difficult, in particular in places where a culture of fear has permeated the society. We’ve seen anti-surveillance advocates wrongly painted as allies of pedophiles or terrorists. In at least one of the countries we’re working in, anonymity is forbidden in its constitution. For some of our partners, promoting a rational debate about checking government power abuses can risk their very freedom, with activists facing jail time or even more serious consequences for speaking out.

Establishing a bottom-up counter-surveillance law movement—even if it's one based on common sense and the entire history of modern democracies—isn't easy. It’s a titanic task that needs the involvement of advocates around the world with different tactics and strategies that are complementary. This is why we’ve also been working to make connections between activists in different countries, with case studies like the Counter-Surveillance Success Stories, and highlighting individuals who are proud to stand up and say "I Fight Surveillance." We’re also teaming up with partners, such as Panoptykon Foundation, to share the strategies and tactics they used in Europe with local groups in Latin America and vice-versa. We're working closely with groups in the Middle East and North Africa, such as 7iber and SMEX, to track, report on, and coordinate responses to state surveillance in these regions.

All of this has helped inform the work we've done in venues like the United Nations, the Office of the High Commissioner on Human Rights, and the Inter-American Commission on Human Rights, where EFF and our allies are helping—with great success—the legal minds there wrap their heads around this new age of state violations of the right to privacy and free expression.

Meanwhile, back in Washington...

7. Stop NSA overreach through impact litigation and new U.S. laws

Executive Order 12333 may be the presidential command that sets the agenda for mass surveillance, but U.S. law also plays a huge role. The NSA claims (often wrongly) that certain U.S. laws allow surveillance of all Internet users, with almost zero oversight of its spying on non-U.S. persons. There's the FISA Amendments Act, which the NSA believes allows it to spy on groups of people instead of with directed warrants and scoop up all of the Internet traffic it can, and grants it carte blanche to target anyone overseas on the grounds that they are potentially relevant to America's "foreign interests." And then there's the Patriot Act, which has been loosely interpreted by the NSA to permit the dragnet surveillance of phone records.
 
EFF Legal Team

Fighting these laws is the bread and butter of our domestic legal team. Our lawsuits, like Jewel v. NSA, aim to demonstrate that warrantless surveillance is illegal and unconstitutional. Our grassroots advocacy is dedicated to showing American lawmakers exactly how U.S. law is broken, what must be done to fix it, and the powerful movement of people working for change.

You can read more details about American law in our addendum below, but here's the upshot: we have to fix the law if we're to stop these secret agencies spying on the world. And we have to make sure that no new tricks are being planned.

That means chipping away at the culture of secrecy that lies at the heart of this mess.

8. Bring transparency to surveillance laws and practices

One of the greatest challenges we face in attempting to end mass surveillance is that we don’t know what we don’t know. Thanks to whistleblower evidence, statements by certain public officials, and years of aggressive litigation under the Freedom of Information Act, we’ve confirmed that the NSA is engaged in mass surveillance of our communications and that it is primarily relying on three legal authorities to justify this surveillance.

But what if the NSA is relying on seven other legal authorities? What if there are other forms of surveillance we have not yet heard about? What if the NSA is partnering with other entities (different countries or different branches of the U.S. government) to collect data in ways we can’t imagine?

It’s extremely difficult to reform the world of surveillance when we don’t have a full picture of what the government is doing and how it’s legally justifying those actions.

With that in mind, we are working to fight for more transparency by:
  • Working to reform the broken classification system, which keeps the government’s actions hidden from public oversight.
  • Using Freedom of Information Act requests and lawsuits to gain access to government documents that detail surveillance practices (and their legal justifications).
  • Helping allies, like Germany and Brazil, to put pressure on the United States to justify its surveillance practices.
  • Educating people about the value of whistleblowers and the important role they play in combating secrecy. This includes advocacy for organizations and platforms like Wikileaks that defend and promote the work of whistleblowers. It also includes highlighting the important contributions provided by whistleblowers like Mark Klein, Bill Binney, Thomas Drake, Edward Snowden, and others.
Global Solutions for a Global Problem

Mass surveillance affects people worldwide, reaching everywhere that the Internet reaches (and many places that it doesn’t!). But laws and court systems are divvied up by jurisdictional lines that don’t make sense for the Internet today. This means we need a range of tactics that include impact litigation, technological solutions, and policy changes both in the United States and across the globe.

This game plan is designed to give you insight into how U.S. laws and policies affect people worldwide, and how we can work to protect people outside of America’s borders.

We're up against more than just a few elements in the American administration here. We're up against a growing despondency about digital privacy, and we're up against the desire of spooks, autocrats, and corporations jockeying for intelligence contracts in every nation, all of whom want to shore up these surveillance powers for themselves. But we work side-by-side with hundreds of other organizations around the world and thousands of supporters in nearly every country. We have the amazing power of technology to protect privacy, organize opposition, and speak up against such damning violations of human rights.

We’re continuing to refine our plan, but we wanted to help our friends understand our thinking so you can understand how each of our smaller campaigns fit into the ultimate objective: secure, private communications for people worldwide.

It's what we’re doing to fight surveillance. But what can you do?

You can join your local digital rights organization, of which there are now hundreds, in almost every nation (and if there isn't one in yours, ask us for advice on starting one). You can pressure companies to increase your protection against government espionage and support companies that make a stand.

You can sign our petition about Executive Order 12333 and help spread the word to others. You can use encryption to protect yourself and raise the cost of mass surveillance, and you can teach your friends and colleagues to use it too. You can personally refuse to cooperate with surveillance and promote privacy protections inside institutions you're a part of. You can tell your friends and colleagues the real risks we are running and how we can turn this mess around.

And whether you're in the United States or not, you can support our plan by becoming a member of EFF.

Addendum: Laws & Presidential Orders We Need to Change

One of the best ways to end mass surveillance by the NSA is to change the United States law to make clear that warrantless surveillance is illegal. However, that’s a little challenging. The NSA is relying on a patchwork of different laws and executive orders to justify its surveillance powers.

Here are a few we know we need to change. Note that there are other parts of U.S. law that may need revision (including provisions such as the Pen Register Trap and Trace and National Security Letters), but this is where we're focusing our energies currently as the primary known authorities used to justify mass surveillance:

Section 215 of the Patriot Act, Known as the "Business Records" Section

Read the law

What it does: The section of the law basically says that the government can compel the production of any "tangible things" that are “relevant" to an investigation.

Why you should care: The NSA relies on this authority to collect, in bulk, the phone records of millions of Americans. There are suggestions it's also being used to collect other types of records, like financial records or credit card records, in bulk as well.

How we can stop it: There are a few ways to fix Section 215. One way is to pass a reform bill, such as the USA FREEDOM Act, which would make clear that using Section 215 to conduct bulk collection is illegal. The USA FREEDOM Act failed to pass in the Senate in 2014, which means it would need to be reintroduced in 2015.

However, there’s an even easier way to defeat this provision of the law. This controversial section of the Patriot Act expires every few years and must be reauthorized by Congress. It’s up for renewal in June 2015, which means Congress must successfully reauthorize the section or it will cease to be a law. We’re going to be mounting a huge campaign to call on Congress not to reauthorize the bill.

We also have three legal cases challenging surveillance conducted under Section 215: Jewel v NSA, Smith v Obama, and First Unitarian Church of Los Angeles v. NSA.

Section 702 of the FISA Amendments Act

Read the law
What it does: This section of law is designed to allow the NSA to conduct warrantless surveillance within the U.S. when the intended target is overseas.

Why you should care: The NSA relies on this law to support PRISM, which compels Internet service providers like Google, Apple, and Facebook to produce its users communications. The NSA's upstream surveillance—which includes tapping into fiber optic cables of AT&T and other telecommunications providers—also relies on this provision. Through these two surveillance options, the NSA "targets" subjects for surveillance. But even when the NSA is "targeting" specific foreign intelligence subjects overseas, they’re "incidentally" collecting communications on millions of people, including both Americans and innocent people abroad.

How we can stop it: Currently, there aren’t any reform bills that show promise. We’re working on educating the public and Congress about the Section 702 and the FISA Amendments Act. In 2017, this authority will be up for reauthorization. We’ll be planning a big campaign to demolish this invasive and oft-abused surveillance authority.

Executive Order 12333

Read the executive order

What it does: Executive orders are legally binding orders given by the President of the United States which direct how government agencies should operate. Executive Order 12333 covers "most of what the NSA does" and is "the primary authority under which the country’s intelligence agencies conduct the majority of their operations."

Why you should care: Executive Order 12333 is the primary authority the NSA uses to conduct its surveillance operations—including mass surveillance programs—overseas. Reforming mass surveillance requires reforming the NSA's authority under EO 12333.

How we can stop it: Executive Order 12333 was created by a presidential order, and so a presidential order could undo all of this damage. That’s why we’re pressuring President Obama to issue a new executive order affirming the privacy rights of people worldwide and ending mass surveillance.

The Funding Hack

While passing a bill through Congress is extremely challenging, another (somewhat more controversial) method of ending this surveillance is through the budget system. Every year, Congress must approve the defense budget. This frequently becomes a contentious battle with numerous amendments introduced and debated. We may see an amendment that tackles some form of surveillance.

Sunday, December 28, 2014

The Apps You Need Now to Keep Your Privacy Intact

By Jay Cassano

There are the basic things you can do to protect your data and your phone, like avoiding public Wi-Fi networks, enabling built-in tools like "Find My iPhone," and using a good password. Both iOS and Android phones offer options for turning off "location services," so apps can't track your coordinates. But in an age of cyberattacks from renegade hackers, non-state actors, and government spies, it's not a terrible idea to arm your phone with apps that provide encrypted communication, anonymous browsing, and theft protection. Below, a tour of some of the best ones out there.

TextSecure (Android)

TextSecure, like its name suggests, secures your text messages. It's the easiest to use open source end-to-end encrypted messaging app out there. It can act as a full replacement for your default texting app or a standalone Wi-Fi/data messaging app like WhatsApp—or both. When messaging other TextSecure users, your messages are automatically encrypted on the fly, though both parties need to have TextSecure installed to benefit from its encrypted messaging. TextSecure handles all of the necessary key exchanges in the background. The app can be set to send messages only over the Internet or only SMS or to just use whichever is available.
TextSecure has two modes: It can handle all of your text messages or it can be used only for texts between TextSecure users. You might think that there's no reason to use TextSecure as your default texting app since the encrypted messaging only works with other TextSecure users. However, there's another privacy benefit to using TextSecure: All of the messages stored locally on your phone are kept in a password-protected encrypted database. So if your phone is ever lost or stolen, your texts can't be accessed by someone who otherwise compromises your phone.

WhatsApp recently integrated TextSecure's code for encrypted messaging. So WhatsApp users are already benefiting from TextSecure's work on messaging security. But to best ensure your privacy, opt for TextSecure because it's fully open source, with code that can be publicly audited.

RedPhone / Signal (Android / iOS)

RedPhone and its iOS equivalent Signal come from the makers of TextSecure and boasts the same ease of use not commonly found in encryption apps that aren't peddling snake oil. What TextSecure does for texting, these apps do for phone calls. (You remember phone calls, right?) Simply install the Android or iOS app and call a friend who also has one of the apps and your calls will be automatically encrypted. The apps are interoperable, so people who use RedPhone can call Signal users and vice versa.
If you're worried that you won't know who of your friends has one of these apps installed, don't worry, the developers have you covered. When you first launch RedPhone or Signal, you'll be prompted to register your phone in their database. That way, when you open your app, you'll instantly see who in your phone's address book is using RedPhone or Signal.

RedPhone comes with one feature boast over Signal. On Android, if you try to place a regular phone call to someone whose number is registered with either app, RedPhone will prompt you to ask if you want to upgrade to an encrypted call. Signal doesn't have that same functionality, presumably because Apple won't allow for the normal phone call user experience to be interrupted.

Orbot + Orweb (Android)

If you pay any attention to the world of digital privacy, you've most likely heard of Tor, the traffic routing software that makes it harder (but not impossible) for your web browsing to be tracked. Orbot brings Tor to Android. It allows other applications to connect to the Internet through Tor, which can help anonymize your traffic and also circumvent bans on websites that have been blocked by repressive governments.

Any app that can use specify proxy settings can route its traffic through Orbot. That includes the default Twitter app, so that you can tweet anonymously on the fly. But the most practical use case is probably for your general web browsing. Orweb is a mobile web browser that is built to work with Orbot out of the box.

ChatSecure (Android / iOS)




ChatSecure is also made by The Guardian Project, the same people who created Orweb. So naturally, you can run ChatSecure through Orbot to get the same benefits of traffic anonymization and firewall circumvention.
But you don't need Orbot to use ChatSecure (which is good for iOS users who don't have access to Orbot). Even if it doesn't anonymize your traffic through Tor, ChatSecure can still act as an encryption layer for messages you're already using to talk to your friends like Facebook chat. Using ChatSecure is a great middle ground to talk more securely with friends who aren't ready to take the leap off of precipices like Google or Facebook chat.

Prey (all platforms)

Prey is billed as an anti-theft tool. If your phone is lost or stolen, your online Prey account lets you track your phone using its GPS. It also lets you remotely lock your phone, sound a loud alarm, and display a message on your phone to whomever is looking at it. While your device is missing, Prey will send you email reports every five minutes (less frequently, if you'd prefer) that include your phone's location and a picture taken with your phone's camera, which might help you identify where exactly it is or who took it.
If everything goes to hell, Prey is also your nuclear security option. You can use it to remotely wipe your phone so that whoever stole it can't access your personal files and settings. There are lots of comparable anti-theft apps out there. But because you're giving permission to an app to remotely access your camera and location, it's important that you be able to trust that app. Because Prey's client software is open source, independent coders can verify that the app isn't doing anything it shouldn't be doing. Prey versions also exist for your Windows, Mac, and Linux laptops.
 
[Locks: Flickr user Tyler Nienhouse]

Saturday, November 22, 2014

It's Time to Scan Your PC for Government Funded Malware

By

Detekt 310x
Amnesty International's free new Detekt tool scans for government-level malware on your PC


It's Cybersecurity Friday here at The Escapist (not really), so when you're not busy freaking out about the possibility that some hacker trolls stole your PlayStation Network login info, you can scan your PC for government-funded malware.

Amnesty International is behind Detekt, a new (and free) malware scanner that specifically looks for bugs attached to government-backed cyberwarfare programs. The scanner comes from AI, along with the Electronic Frontier Foundation.

Once you download the Detekt executable, [Note from the Writer: You are downloading and running a program, so the usual "try at your own risk," warning applies here.] the GUI guides you through a typical-looking malware scan, which can take up to 30 minutes (depending on PC speed and drive size). You'll need to run the program as an Administrator in order for it to work. Currently, Windows 8.1 is not supported.

You, me, and virtually everyone else on here likely has nothing to worry about, and the scan will finish empty-handed. For the unlucky few that do find something? This tool is a scanner, and not a removal program, so you're up Hacker Creek without a paddle, I'm afraid. (Translation: it's hard drive reformatting time!)

Government-sponsored cyberattacks are nothing new; China does it, the United States does it, and so do a number of other nations across the globe. At least now you can find out if you're an innocent casualty in this "war" happening in those Internet tubes.

Source: Amnesty International | The Verge

Friday, November 21, 2014

Anonymous Releases New Video Warning Ferguson Police And KKK

By Lilly Workneh



A video surfaced Thursday reportedly released by the hacker group Anonymous warning Ferguson, Missouri police officers and the Ku Klux Klan to remain peaceful and refrain from using violence against local protesters.

Anonymous, an unidentified group of online activists against racism and violence, published the video after they they launch denial of service attacks to take down a site associated with the KKK and seized two Twitter accounts earlier this week in response to deadly threats the white supremacist group made to demonstrators in Ferguson.

The hacker collective refers to this series of attacks -- which has also unmasked the identities of alleged KKK members -- as part of a campaign recognized as #operationKKK or #opKKK.

“To the KKK and police, be peaceful or you will face the consequences,” the video stated. “To the protesters, do not be afraid. We are here for you and will protect and serve you. We are the law now.”

The video also retaliates against direct threats reportedly made by Frank Ancona, the leader of the Missouri-based KKK chapter who appeared on a widely-criticized live MSNBC segment last week and defended claims of using “lethal force” against peaceful protesters.

Ancona’s threat to Anonymous allegedly claims that members of the group will be “strung up next to the chimps.” In response, Anonymous stated that the collective has no tolerance for Ancona’s warning.

“When the grand jury indictment is announced soon, we will take every precaution needed to defend ourselves. The protesters will take to the streets peacefully, as they always have,” Anonymous stated in the video. “Your violent ideology will not prevail in this fight.”

As for statements directly addressing the police, Anonymous warned law enforcement to maintain the peace and discouraged the use of any violence.

“If you use violent acts against the protesters as you have before, you should know that you are being watched very closely,” the video states. “You can not get away with anything.”

In an Anonymous Internet Relay Chat Monday, a member of the group named “SiX” told The Huffington Post:

“We want the KKK gone, forever. Don’t worry, we know what we’re doing.”

Aside from this newly-released video, members of Anonymous have sent messages through various social media outlets including Twitter and Instagram along with posts published through their website.

And while they are active on several public platforms, their main message resonates in solidarity - as the group stated in the video:

“We are Anonymous. We are Legion. We do not forgive. We do not forget.”

Saturday, November 8, 2014

Website Peeps Into 73,000 Unsecured Security Cameras Via Default Passwords

Posted by Soulskill

colinneagle writes:  
 
After coming across a Russian website that streams video from unsecured video cameras that employ default usernames and passwords (the site claims it's doing it to raise awareness of privacy risks), a blogger used the information available to try to contact the people who were unwittingly streamed on the site. It didn't go well. The owner of a pizza restaurant, for example, cursed her out over the phone and accused her of "hacking" the cameras herself. And whoever (finally) answered the phone at a military building whose cameras were streaming on the site told her to "call the Pentagon."

The most common location of the cameras was the U.S., but many others were accessed from South Korea, China, Mexico, the UK, Italy, and France, among others. Some are from businesses, and some are from personal residences. Particularly alarming was the number of camera feeds of sleeping babies, which people often set up to protect them, but, being unaware of the risks, don't change the username or password from the default options that came with the cameras.

It's not the first time this kind of issue has come to light. In September 2013, the FTC cracked down on TRENDnet after its unsecured cameras were found to be accessible online. But the Russian site accesses cameras from several manufacturers, raising some new questions — why are strong passwords not required for these cameras? And, once this becomes mandatory, what can be done about the millions of unsecured cameras that remain live in peoples' homes?

Monday, November 3, 2014

FBI secretly seeking legal power to hack any computer, anywhere

By Cory Doctorow

The Bureau is seeking a rule-change from the Administrative Office of the US Courts that would give it the power to distribute malware, hack, and trick any computer, anywhere in the world, in the course of investigations; it's the biggest expansion of FBI spying power in its history and they're hoping to grab it without an act of Congress or any public scrutiny or debate.
But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
The amendment inserts a clause that would allow a judge to issue warrants to gain “remote access” to computers “located within or outside that district” (emphasis added) in cases in which the “district where the media or information is located has been concealed through technological means”. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.
Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network
FBI demands new powers to hack into computers and carry out surveillance [Ed Pilkington/The Guardian]

(Thanks, Melted_Crayons!)

Friday, October 10, 2014

Big Brother is so much bigger than the NSA

By


Big Brother is so much bigger than the NSA
Why did Bradley Cooper and Jessica Alba fail to record a tip when they paid their cabbies during New York City taxi rides back in 2013? Why was Cooper near a Mediterranean restaurant in Greenwich Village? Why was Alba at a ritzy hotel in Soho?

We don’t know the answers, but we do know exactly when and where the movie stars were going, and we also know there’s no record of them forking over any gratuity. What’s worrisome, say privacy experts, is that we know all of this not from some special government sting operation but from publicly available data about millions of people’s movements throughout New York City.

That information, released in an open records request, validates the concerns of those who argue that while consumers’ digital metadata may seem to be anonymous, it actually isn’t. It takes just one or two other pieces of information to turn seemingly anonymous tranches of metadata into specific information about individuals — and not just those who are famous.

“The more computing power and publicly available data, the easier it becomes to identify individuals in the data,” says Utrecht University’s Stefan Kulk. “In a time when even government institutions upload large online data sets for the sake of open-data policies, the scale of the problem of de-anonymized data providing insights into everyone’s day-to-day life will only increase.”

In the case of the taxi info, data analyst Christopher Whong filed an open records request in March 2014 for New York’s database of cab fare, tip and location information after seeing a tweet from the city’s Taxi and Limousine Commission. Though that database of 174 million cab rides in 2013 includes no passenger names, software engineer Vijay Pandurangan was able to link the data to other publicly available information about license plates, cab driver identities and taxi companies’ medallion numbers.

Then, to show the individualized surveillance power of the seemingly anonymous data, Anthony Tockar of Neustar Research cross-referenced the information with publicly available photos of celebrities getting into cabs with identifiable license plates. That allowed Tockar to declare that Cooper’s “cab took him to Greenwich Village, possibly to have dinner at Melibea, and that he paid $10.50, with no recorded tip.” He also revealed that “Alba got into her taxi outside her hotel, the Trump SoHo, and somewhat surprisingly also did not add a tip to her $9 fare.” (If Cooper or Alba tipped with cash, then that might not show up on the records.)


To dispel any notions that such information could be used only to track celebrities, Tockar showed how the same data could be employed to pinpoint the home addresses — and possible identities — of frequent visitors to Larry Flynt’s Hustler Club.

News of taxi metadata being turned into individual-specific information follows similar stories that emerged in the wake of Edward Snowden’s disclosures about the National Security Agency vacuuming up metadata.

Last year, for example, Stanford University researchers showed how medical, financial and other personal information could be disclosed just by cross-referencing phone metadata with publicly available databases. Similarly, Susan Landau, former Sun Microsystems engineer and author of the book “Surveillance or Security?” told the New Yorker that metadata can reveal details about everything from upcoming corporate transactions to journalists’ sources to political negotiations.

To illustrate that, Duke University associate professor Kieran Healy published a now-legendary essay, explaining how British forces could have come to target Paul Revere — and potentially snuff out the American Revolution — if they had access to the same kind of metadata the NSA collects.

But, then, it’s not just the NSA that’s vacuuming up data — it can also be local governments and corporations.

Of course, they may not all have nefarious motives for collecting data. The problem, though, is that the data itself can be used in nefarious ways.
David Sirota David Sirota is a senior writer for the International Business Times and the best-selling author of the books "Hostile Takeover," "The Uprising" and "Back to Our Future." E-mail him at ds@davidsirota.com, follow him on Twitter @davidsirota or visit his website at www.davidsirota.com.